assets

Results 51 - 75 of 485Sort Results By: Published Date | Title | Company Name
Published By: Limelight Networks     Published Date: Nov 02, 2011
Learn how to turn content assets into online consumer engagement and higher web conversions.
Tags : 
content assets, content marketing, engagement, web conversion, limeilght, strategic marketing, master
    
Limelight Networks
Published By: CA Technologies     Published Date: Sep 29, 2011
Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.
Tags : 
risk, attack, security, business
    
CA Technologies
Published By: IBM     Published Date: Sep 22, 2011
Companies need capabilities for identifying data assets and relationships, assessing data growth and implementing tiered storage strategies-capabilities that information governance can provide. It is important to classify enterprise data, understand data relationships and define service levels. Database archiving has proven effective in managing continued application data growth especially when it is combined with data discovery.
Tags : 
ibm, application data, technology, enterprise, database archive
    
IBM
Published By: MobileIron     Published Date: Aug 03, 2016
In this edition we discuss emerging risks, report OS enterprise share, and list the top blacklisted consumer apps. We conclude with our recommendations for enterprises to protect their assets against mobile risks and threats. Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. When attacks against users are successful, they can result in the loss of both personal and business data.
Tags : 
    
MobileIron
Published By: Dynatrace     Published Date: Dec 16, 2015
This eBook is inspired by the famous 6th century Chinese manuscript: The Art of War. Today, we will embark on a mission to continuously deliver assets to the operational battlegrounds safely, securely, and quickly.
Tags : 
dynatrace, devops, application development, automated testing, performance monitoring, software development, knowledge management, enterprise applications
    
Dynatrace
Published By: CA Technologies     Published Date: Aug 22, 2017
Across industry sectors, the boundaries of the traditional enterprise are blurring, as organizations open up their on-premise data and application functionality to partner organizations, the Web, mobile apps, smart devices and the cloud. APIs (application programming interfaces) form the foundation of this new open enterprise, allowing enterprises to reuse their existing information assets across organizational boundaries.
Tags : 
    
CA Technologies
Published By: Juniper Networks     Published Date: Aug 10, 2017
Resistance to change is futile. Financial services are becoming more embedded in the banking customer’s everyday life, driving unprecedented levels of change across the industry. The unfolding digital economy is ushering a new era of technology adoption in banking. From cloud to open banking APIs, these play a defining role in enabling banks to create new digital products and services, refresh the bank branch, find new customer segments, and monetize underutilized data and information assets.
Tags : 
opening banking, api, data, currency, cloud transformation, frictionless banking, business model disruption
    
Juniper Networks
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
At a Glance To excel as resource manager, you need to quickly find the right talent to solve the right problems at the right time. CA Project & Portfolio Management (CA PPM) provides you with the modern resource management functions you need to maximize your company’s most valuable assets: the people. Modern, simple and powerful, CA PPM helps you work smarter by region, department, project, role and skill set.
Tags : 
    
CA Technologies EMEA
Published By: IBM     Published Date: Apr 12, 2016
The digital transformation that organizations are striving for today requires a mindset of "no limits" in terms of securely exposing critical business assets for internal and external consumption. In order to be an agile, digital business, enterprises need to seamlessly connect across hybrid environments, applications, data and processes, keeping a keen eye on an open cloud strategy. They also need a secure integration framework to provide controlled access, a single dashboard providing performance insights, and easy access to digital assets for your developers. This webcast will explore all of these areas in depth, to support your enterprise's quest to become a next-generation digital business.
Tags : 
ibm, digital business, api economy, api management, apim, api, enterprise applications, business technology
    
IBM
Published By: Oracle     Published Date: Sep 08, 2016
This Webcast explores what the next generation of Finance function looks like. Watch this webcast now to find out: How companies are monitoring and measuring intangibles within their business. How the CFO role is evolving in this increasingly digital economy that we are all living.
Tags : 
digital technologies, digital landscape, finance, business models, next generation finance, finance function, cloud, big data, intagible assets
    
Oracle
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Mainframe     Published Date: Sep 12, 2008
The CA Automated Storage Optimization Mainframe Suite provides a best-practices-based and intelligent approach to SRM, delivering the tools to identify and classify your storage assets. Access this Technology Brief to understand how to maximize use of existing storage resources and ensures protection of business-critical applications and information.
Tags : 
srm, storage resource management, zos, z/os, ibm, ibm server, ca mainframe, mainframe, ibm mainframe, storage optimization, mainframe storage, networking, platforms, storage
    
CA Mainframe
Published By: Cisco     Published Date: Sep 15, 2015
To effectively respond to these challenges, public safety agencies must be able to rely on secure networks with integrated voice, video, and data capabilities. With these networks and their associated assets, agencies can obtain more timely and accurate information, enhancing situational awareness and improving response times. Cisco and our partners can help agencies obtain secure networks.
Tags : 
public safety, iot, law enforcement, emergency response, strategy
    
Cisco
Published By: Dyn     Published Date: Apr 27, 2016
Download this whitepaper and learn: - The six macro trends driving the need for application, network and Internet performance management solutions - Key insights you've been missing when it comes to your portfolio of online assets, and how they interact with the public Internet - How you can receive a true "end-to-end" view into Internet performance and ensure availability and implement advanced traffic steering capabilities to your existing infrastructure
Tags : 
dyn, internet performance, internet performance management
    
Dyn
Published By: Dell EMC     Published Date: Aug 29, 2017
Choose your Isilon hardware based on your need, all-flash; accelerate demanding file workloads with extreme performance and scalability, Hybrid; Realize performance, capacity, and value for a wide range of enterprise file workloads and Archive; Lower the cost to store and protect aging data assets while providing near-primary accessibility.
Tags : 
    
Dell EMC
Published By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets – leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : 
network security, security breaches, pci, dss, hippa
    
Brother
Published By: Dynatrace     Published Date: May 20, 2016
The Art of DevOps: Embark on a mission to continuously deliver assets to the operational battlegrounds safely, securely, and quickly. This eBook gives you, a veteran of application development wars, recommendations that will put you at strategic advantage to win today's war: - Supplement manual tests with automated testing - Add advanced performance monitoring technology to your arsenal to prevent problems from infiltrating your code after check-in - Leverage best-in-class communications and advanced performance monitoring to quickly identify and prevent casualties resulting from poor performance
Tags : 
dynatrace, devops, software development, application development, testing, it management, enterprise applications
    
Dynatrace
Published By: Akamai Technologies     Published Date: Mar 10, 2016
When your Internet-facing network comes under DDoS attack, does your entire organization panic – or does everyone know exactly what to do? Read this whitepaper to learn how to protect network assets, websites, and web applications against DDoS attacks and best practices for adding DDoS mitigation to a corporate incident response plan.
Tags : 
ddos mitigation, best practices, akamai technology, cyberdefense, cyber security
    
Akamai Technologies
Published By: Hewlett Packard Enterprise     Published Date: Oct 11, 2017
In a world without definable, defensible perimeters, how do you protect critical data and assets in your small or midsize business? Well, you start by deploying infrastructure components that are designed with security baked in at every level, from the core to the cloud and everywhere in between.
Tags : 
    
Hewlett Packard Enterprise
Published By: CA Technologies     Published Date: Jul 26, 2017
Extending DevOps to mainframe applications and teams is essential towards the agility and velocity that enterprises require to remain innovative in today’s turbulent digital business environment. Talking Points: • For enterprises with mainframes, trying to achieve the benefits of Digital Transformation without dealing with existing mainframe assets is a fool’s errand. • Breaking down silos and moving to DevOps is central to what it means to undergo Digital Transformation. • Including the mainframe in modern software development approaches can improve quality overall, reduce test cycles and deployment timeframes, and ensure mainframe-based applications support the end-to-end performance requirements that today’s customers demand.
Tags : 
    
CA Technologies
Published By: Intel     Published Date: May 15, 2017
Read on to find out how to catch malicious activities targeting your critical assets, verify compliance, set early warning systems, and empower your existing tools with premium, contextual alerts.
Tags : 
threat detection, threat and vulnerability management, compliance, security, cyber security, cyber attacks
    
Intel
Published By: Schneider Electric     Published Date: Jun 05, 2018
Balancing the increased pressure to improve productivity and quality, while reducing cost against mandated safety regulations is one of the most complex challenges in industry today.
Tags : 
process automation, ecostruxure plant, operational profitability, cybersecurity, safety, smart control, empowered operators, optimized assets, future of automation, reliability
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 05, 2018
Integrating safety and process environments can improve reliability, profitability and cybersecurity. Read Frost & Sullivan’s white paper and plan your digital transformation today.
Tags : 
process safety, profitable safety, smart control, empowered operators, optimized assets, future of automation, reliability, cybersecurity, operational profitability, ecostruxure plant, process automation
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 05, 2018
Since the sepia-toned days of the early 19th century, industry has sought effective ways to control manufacturing and production processes. New technology has greatly influenced factories and plants, resulting in new operational approaches to maximize benefits and achieve 100% ROI in a very short time.
Tags : 
process control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation
    
Schneider Electric
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com